LEADER 06639nam 2200613 450 001 996465919603316 005 20220506083342.0 010 $a3-540-73547-X 024 7 $a10.1007/978-3-540-73547-2 035 $a(CKB)1000000000490358 035 $a(SSID)ssj0000316415 035 $a(PQKBManifestationID)11212886 035 $a(PQKBTitleCode)TC0000316415 035 $a(PQKBWorkID)10281801 035 $a(PQKB)11525277 035 $a(DE-He213)978-3-540-73547-2 035 $a(MiAaPQ)EBC3063191 035 $a(MiAaPQ)EBC6707155 035 $a(Au-PeEL)EBL6707155 035 $a(PPN)123163633 035 $a(EXLCZ)991000000000490358 100 $a20220506d2007 uy 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 00$aAutonomic and trusted computing $e4th international conference, ATC 2007, Hong Kong, China, July 11-13, 2007 : proceedings /$fBin Xiao [and three others] (editors) 205 $a1st ed. 2007. 210 1$aBerlin ;$aHeidelberg :$cSpringer,$d[2007] 210 4$dİ2007 215 $a1 online resource (XVIII, 574 p.) 225 1 $aLecture notes in computer science ;$v4610 300 $aInternational conference proceedings. 311 $a3-540-73546-1 320 $aIncludes bibliographical references and index. 327 $aKeynote Speech -- An Intelligent Home System as a Development and Test Platform for Ubiquitous Computing -- Remarks on Self-organization and Trust in Organic Computing Systems -- Cryptography and Signatures -- ZigBee Security Using Identity-Based Cryptography -- Efficient Identity-Based Signcryption Scheme for Multiple Receivers -- Identity-Based Proxy Signature from Pairings -- Cryptanalysis of BGW Broadcast Encryption Schemes for DVD Content Protection -- A Digital Signature Mechanism and Authentication Scheme for Group Communication in Grid -- Cryptanalysis of Server-Aided RSA Key Generation Protocols at MADNES 2005 -- Autonomic Computing and Services -- Service-Context Knowledge-Based Solution for Autonomic Adaptation -- Middleware Based Context Management for the Component-Based Pervasive Computing -- Building Autonomic and Secure Service Oriented Architectures with MAWeS -- Biology as Inspiration Towards a Novel Service Life-Cycle -- Design of Service?Based Systems with Adaptive Tradeoff Between Security and Service Delay -- Secure and Trusted Computing -- Provably Secure Identity-Based Threshold Unsigncryption Scheme -- Final Fantasy ? Securing On-Line Gaming with Trusted Computing -- An Efficient and Secure Rights Sharing Method for DRM System Against Replay Attack -- Establishing Trust Between Mail Servers to Improve Spam Filtering -- Autonomic Models and Architectures -- An Architecture for Self-healing Autonomous Object Groups -- A Generic and Modular System Architecture for Trustworthy, Autonomous Applications -- Cooperative Component Testing Architecture in Collaborating Network Environment -- An Approach to a Trustworthy System Architecture Using Virtualization -- Trusted Models and Systems -- CuboidTrust: A Global Reputation-Based Trust Model in Peer-to-Peer Networks -- A Trust Evolution Model for P2P Networks -- An Adaptive Trust Control Model for a Trustworthy Component Software Platform -- Towards Trustworthy Resource Selection: A Fuzzy Reputation Aggregation Approach -- Intrusion Detection -- An Adaptive Spreading Activation Approach to Combating the Front-Peer Attack in Trust and Reputation System -- Research on Cost-Sensitive Learning in One-Class Anomaly Detection Algorithms -- Improved and Trustworthy Detection Scheme with Low Complexity in VBLAST System -- Stepping-Stone Detection Via Request-Response Traffic Analysis -- SPA Countermeasure Based on Unsigned Left-to-Right Recodings -- Access Control -- A New One-Way Isolation File-Access Method at the Granularity of a Disk-Block -- Novel Remote User Authentication Scheme Using Bilinear Pairings -- On the Homonymous Role in Role-Based Discretionary Access Control -- Ontology Based Hybrid Access Control for Automatic Interoperation -- Recoverable Tamper Proofing Technique for Image Authentication Using Irregular Sampling Coding -- Trusted Computing and Communications -- A Decomposition Strategy Based Trusted Computing Method for Cooperative Control Problem Faced with Communication Constraints -- Formal Analysis of Secure Bootstrap in Trusted Computing -- Calculating Trust Using Aggregation Rules in Social Networks -- Enhancing Grid Security Using Trusted Virtualization -- A Wearable System for Outdoor Running Workout State Recognition and Course Provision -- Key Management -- Malicious Participants in Group Key Exchange: Key Control and Contributiveness in the Shadow of Trust -- Efficient Implementation of the Keyed-Hash Message Authentication Code Based on SHA-1 Algorithm for Mobile Trusted Computing -- A Secure DRM Framework for User?s Domain and Key Management -- A Secret-Key Exponential Key Agreement Protocol with Smart Cards -- Key Establishment Scheme for Sensor Networks with Low Communication Cost -- Worm Detection and Data Security -- A Worm Containment Model Based on Neighbor-Alarm -- A Distributed Self-healing Data Store -- Malicious Codes Detection Based on Ensemble Learning -- Generating Simplified Regular Expression Signatures for Polymorphic Worms -- Secured Services and Applications -- AAA for Spontaneous Roaming Agreements in Heterogeneous Wireless Networks -- A Prediction-Based Fair Replication Algorithm in Structured P2P Systems -- TransCom: A Virtual Disk Based Self-management System -- Defending Against Jamming Attacks in Wireless Local Area Networks -- Fault-Tolerant Systems -- Schedulability Analysis of the Fault-Tolerant Hard Real-Time Tasks with Limited Priority Levels -- A Property-Based Technique for Tolerating Faults in Bloom Filters for Deep Packet Inspection -- A Fuzzy Logic Approach for Secure and Fault Tolerant Grid Job Scheduling -- An Enhanced DGIDE Platform for Intrusion Detection. 410 0$aLecture notes in computer science ;$v4610. 606 $aAutonomic computing$vCongresses 606 $aComputer security$vCongresses 606 $aComputer networks$xSecurity measures$vCongresses 615 0$aAutonomic computing 615 0$aComputer security 615 0$aComputer networks$xSecurity measures 676 $a005.8 702 $aXiao$b Bin$cDr, 712 12$aATC (Conference) 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996465919603316 996 $aAutonomic and Trusted Computing$9773129 997 $aUNISA LEADER 01860oam 2200517M 450 001 9910716290103321 005 20200213071003.6 035 $a(CKB)5470000002519220 035 $a(OCoLC)1065634871 035 $a(OCoLC)995470000002519220 035 $a(EXLCZ)995470000002519220 100 $a20071213d1926 ua 0 101 0 $aeng 135 $aurcn||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aRelief of persons suffering loss on account of Lawton fire, 1917. June 30, 1926. -- Committed to the Committee of the Whole House and ordered to be printed 210 1$a[Washington, D.C.] :$c[U.S. Government Printing Office],$d1926. 215 $a1 online resource (5 pages) 225 1 $aHouse report / 69th Congress, 1st session. House ;$vno. 1575 225 1 $a[United States congressional serial set] ;$v[serial no. 8537] 300 $aBatch processed record: Metadata reviewed, not verified. Some fields updated by batch processes. 300 $aFDLP item number not assigned. 606 $aClaims 606 $aMalicious mischief 606 $aVandalism 606 $aFires 606 $aLegislative amendments 606 $aMilitary bases 608 $aLegislative materials.$2lcgft 615 0$aClaims. 615 0$aMalicious mischief. 615 0$aVandalism. 615 0$aFires. 615 0$aLegislative amendments. 615 0$aMilitary bases. 701 $aVincent$b Bird J.$f1880-1931$pRepublican (MI)$01388440 801 0$bWYU 801 1$bWYU 801 2$bOCLCO 801 2$bOCLCQ 906 $aBOOK 912 $a9910716290103321 996 $aRelief of persons suffering loss on account of Lawton fire, 1917. June 30, 1926. -- Committed to the Committee of the Whole House and ordered to be printed$93444352 997 $aUNINA LEADER 03764nam 2200721Ia 450 001 9910779148503321 005 20200520144314.0 010 $a1-283-89850-0 010 $a0-8122-0790-4 024 7 $a10.9783/9780812207903 035 $a(CKB)2550000000104578 035 $a(OCoLC)802050317 035 $a(CaPaEBR)ebrary10576129 035 $a(SSID)ssj0000736442 035 $a(PQKBManifestationID)11489630 035 $a(PQKBTitleCode)TC0000736442 035 $a(PQKBWorkID)10772767 035 $a(PQKB)11194429 035 $a(MdBmJHUP)muse19913 035 $a(DE-B1597)449565 035 $a(OCoLC)1011454783 035 $a(OCoLC)979744434 035 $a(DE-B1597)9780812207903 035 $a(Au-PeEL)EBL3441688 035 $a(CaPaEBR)ebr10576129 035 $a(CaONFJC)MIL421100 035 $a(OCoLC)843076321 035 $a(MiAaPQ)EBC3441688 035 $a(EXLCZ)992550000000104578 100 $a20090615d2010 uy 0 101 0 $aeng 135 $aurcn||||||||| 181 $ctxt 182 $cc 183 $acr 200 14$aThe bagnios of Algiers$b[electronic resource] $eand, the great Sultana : two plays of captivity /$fMiguel de Cervantes ; edited and translated by Barbara Fuchs and Aaron J. Ilika 210 $aPhiladelphia $cUniversity of Pennsylvania Press$dc2010 215 $a1 online resource (205 p.) 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a0-8122-2215-6 320 $aIncludes bibliographical references. 327 $tFront matter --$tContents --$tIntroduction --$tThe Bagnios of Algiers --$tThe Great Sultana --$tBibliography --$tAcknowledgments 330 $aBest known today as the author of Don Quixote-one of the most beloved and widely read novels in the Western tradition-Miguel de Cervantes Saavedra (1547-1616) was a poet and a playwright as well. After some early successes on the Madrid stage in the 1580's, his theatrical career was interrupted by other literary efforts. Yet, eager to prove himself as a playwright, shortly before his death he published a collection of his later plays before they were ever performed. With their depiction of captives in North Africa and at the Ottoman court, two of these, "The Bagnios of Algiers" and "The Great Sultana," draw heavily on Cervantes's own experiences as a captive, and echo important episodes in Don Quixote. They are set in a Mediterranean world where Spain and its Muslim neighbors clashed repeatedly while still remaining in close contact, with merchants, exiles, captives, soldiers, and renegades frequently crossing between the two sides. The plays provide revealing insights into Spain's complex perception of the world of Mediterranean Islam. Despite their considerable literary and historical interest, these two plays have never before been translated into English. This edition presents them along with an introductory essay that places them in the context of Cervantes's drama, the early modern stage, and the political and cultural relations between Christianity and Islam in the early modern period. 606 $aIslam$vDrama 606 $aCaptivity$vDrama 607 $aAlgiers (Algeria)$vDrama 607 $aIstanbul (Turkey)$vDrama 610 $aCultural Studies. 610 $aLiterature. 615 0$aIslam 615 0$aCaptivity 676 $a862/.3 700 $aCervantes Saavedra$b Miguel de$f1547-1616.$0131561 701 $aFuchs$b Barbara$f1970-$0176857 701 $aIlika$b Aaron$01519710 701 2$aCervantes Saavedra$b Miguel de$f1547-1616.$0131561 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910779148503321 996 $aThe bagnios of Algiers$93757977 997 $aUNINA